icon

We found results for “

CVE-2024-4264

Good to know:

icon

Date: May 17, 2024

A remote code execution (RCE) vulnerability exists in the berriai/litellm project due to improper control of the generation of code when using the "eval" function unsafely in the "litellm.get_secret()" method. Specifically, when the server utilizes Google KMS, untrusted data is passed to the "eval" function without any sanitization. Attackers can exploit this vulnerability by injecting malicious values into environment variables through the "/config/update" endpoint, which allows for the update of settings in "proxy_server_config.yaml".

Language: Python

Severity Score

Severity Score

Weakness Type (CWE)

Improper Control of Generation of Code ('Code Injection')

CWE-94

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): HIGH
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): HIGH
Integrity (I): HIGH
Availability (A): HIGH

Do you need more information?

Contact Us